Cayenne Apache Cayenne

Do you want an email whenever new security vulnerabilities are reported in Apache Cayenne?

By the Year

In 2024 there have been 0 vulnerabilities in Apache Cayenne . Cayenne did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 1 8.80
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 1 8.10

It may take a day or so for new Cayenne vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Apache Cayenne Security Vulnerabilities

Hessian serialization is a network protocol that supports object-based transmission

CVE-2022-24289 8.8 - High - February 11, 2022

Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-current patch versions of Java, an attacker with client access to Cayenne ROP can transmit a malicious payload to any vulnerable third-party dependency on the server. This can result in arbitrary code execution.

Marshaling, Unmarshaling

This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2

CVE-2018-11758 8.1 - High - August 22, 2018

This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, the attacker will be able to instruct the XML parser built into CayenneModeler to transfer files from a local machine to a remote machine controlled by the attacker. The cause of the issue is XML parser processing XML External Entity (XXE) declarations included in XML. The vulnerability is addressed in Cayenne by disabling XXE processing in all operations that require XML parsing.

XXE

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Apache Cayenne or by Apache? Click the Watch button to subscribe.

Apache
Vendor

subscribe